This project generates a zone file for BIND, Dnsmasq and Unbound DNS servers using data from the StevenBlack/hosts project. The generated zone files can be used to block ads and malware for an entire network when used with a local DNS server.
DNS based ad blockers can support wildcard entries. This tool filters out any subdomains of known adware or malware domains, reducing the number of zone entries required from <%= hosts %> down to <%= zones %>.
DNS Server | Response Type | Download | SHA256 Checksum |
---|---|---|---|
BIND | 0.0.0.0 | link | link |
BIND (RPZ) | NXDOMAIN | link | link |
Dnsmasq | 0.0.0.0 | link | link |
Dnsmasq | NXDOMAIN | link | link |
Unbound | 0.0.0.0 | link | link |
Unbound | NXDOMAIN | link | link |
The blacklists are updated every 24 hours with the latest data from StevenBlack/hosts. The builds logs are publicly available on Travis CI and each zone file is tested to be valid before publishing.
The blacklist can be generated using Node.js 8.4.0 or later.
Install:
git clone https://github.com/oznu/dns-zone-blacklist.git
cd dns-zone-blacklist
npm install
Then build:
node build.js
The compiled blacklist files will be saved to the ./bind
, ./dnsmasq
and ./unbound
a directories in the root of the project.
Custom entries can be added to the custom.blacklist.json file in the root of this project before building.
Any domains you wish to exclude from the blacklist can be added to the custom.whitelist.json file in the root of this project before building.